Azure AD will stop supporting sub TLS 1.2 versions, so you might want to investigate whether you have clients that are going to be impacted by the deprecation.
The deprecation date is mentioned on the links below (January 31st, 2022, at the time of writing)
There is good guidance available here on these two articles
Typical use cases are also mentioned in the articles
Investigation using Azure Monitor
If you have both sources exported from Azure AD you can use query below
union SigninLogs, AADNonInteractiveUserSignInLogs | where TimeGenerated > now() -30d | project AuthenticationProcessingDetails, UserPrincipalName, IPAddress, UserAgent, AppDisplayName, ClientAppUsed | mv-expand parse_json(AuthenticationProcessingDetails) | where AuthenticationProcessingDetails.key == "Legacy TLS (TLS 1.0, 1.2, 3DES)" and AuthenticationProcessingDetails.value == "True" | summarize count() by UserPrincipalName, ClientAppUsed, AppDisplayName, UserAgent, tostring(AuthenticationProcessingDetails) | summarize make_set(strcat(count_, ':', ClientAppUsed, ':' ,AppDisplayName )) by UserPrincipalName, AuthenticationProcessingDetails
The query displays count and client details